www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 4 Issue 6 June 2015, Page No. 12368-12373
Privacy Preserving Public Auditing Mechanism For Shared Data In Cloud
Computing Environment With Dynamic Groups
Mrs. Suvarna L. kattimani1, Mr. Aniruddha A. Atwadkar2, Dr Suvarna Nandyal3
Assistant Professor, Dept of CSE, BLDEA’S Dr Halkatti College of Engineering & Technology, vijayapur,
karnataka,(India)
2
PG Scholar, Dept of CSE, BLDEA’S Dr Halkatti College of Engineering & Technology, vijayapur, karnataka,(India)
3
Professor, HOD Dept of CSE, P.D.A College Of Engineering, Gulbarga,karnataka, (India)
1
Abstract
In Cloud environment, clients can remotely store their information and appreciate the on-interest high caliber
applications and administrations. The respectability of cloud information is liable to distrust because of the presence
of equipment/programming disappointments and human lapses. A few components have been intended to permit both
information proprietors and open verifiers to proficiently review cloud information uprightness without recovering the
whole information from the cloud server. Nonetheless, open reviewing on the uprightness of imparted information to
these current instruments will open evaluating on shared information put away in the cloud that endeavour ring
signature to figure confirmation metadata expected to review the rightness of shared data.so that an outsider
evaluator (TPA) has the capacity check the honesty of shared information for clients without recovering the whole
information. In the interim, the character of the user on every block of data in shared information is kept private from
the TPA likewise ready to perform numerous examining undertakings at the same time as opposed to checking them
one by one.
Keywords: Cloud environment, shared data, public auditing, privacy preserving, TPA.
The honesty of information in distributed storage,
1. INTRODUCTION
Cloud administration supplier’s deal with a venture class
foundation
that
offers
an
adaptable,
secure
and
dependable environment for clients, at a much lower
minimal cost because of the sharing way of assets. It is
schedule
for
clients
to
utilize
distributed
storage
administrations to share information with others in a
group, as information sharing turns into a standard element
in most distributed storage offerings.
notwithstanding, is subject to distrust and investigation, as
information put away in an untrusted cloud can without
much of a stretch be lost or defiled, due to equipment
disappointments and human mistakes. To ensure the
honesty of cloud information, it is best to perform open
inspecting by presenting an outsider examiner (TPA), who
offers its inspecting administration with all the more
capable communication and correspondence capacities
than general clients.
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12368
As of late, numerous components have been proposed to
permit an information proprietor itself as well as an open
verifier to effectively perform respectability checking
without downloading the whole information from the
cloud, which is alluded to as open examining. In these
instruments, information is isolated into numerous little
blocks of data, where every piece is autonomously signed
by the proprietor and an irregular blend of the considerable
number of pieces rather than the entire information is
recovered for trustworthiness checking .An open verifier
could be an information client (e.g. researcher)who might
Fig.1. Proprietor, third party auditor
and cloud server in System model
want to use the proprietor's information by means of the
This paper involves three parties, the cloud server, the
cloud or an outsider evaluator (TPA) who can give master
outside verifier (TPA) and proprietors. There are two types
uprightness
open
of proprietors in a group the original user and a various
examining instruments can really be reached out to confirm
other proprietors. We consider how to review the
shared information integrity on dynamic groups.
uprightness of imparted information in the cloud with
checking
administrations.
Existing
dynamic groups. It implies the group is not predefined
However, the new significant mechanism addresses the
security for safeguarding the protection of proprietor from
the outside verifier (TPA), this is only done on the static
groups. The verifier has prior information about the groups
to be verified. Having prior knowledge about groups to be
audited to the untrusted auditor may cause lead security
break of information.
Also, extend this mechanism to support dynamic groups
and batch auditing of dynamic groups, which can perform
multiple auditing tasks simultaneously and improve the
efficiency of verification for multiple auditing tasks.
Auditing on dynamic groups is necessary to secure the
identity of user and information as the auditor has no prior
information of groups to be audited.
before shared information is made in the cloud and the
enrolment of another proprietor can be included into the
group and a current group and an existing group member
can be revoked during data sharing while still preserving
identity privacy. The original proprietor is responsible for
deciding who is able to share her data before outsourcing
data to the cloud.
At the point when a proprietor (either the original
proprietor or a group proprietor) wishes to check the
respectability of shared information, she first sends an
examining request to the TPA. In the wake of accepting the
inspecting demand, the TPA produces an evaluating
message to the cloud server, and recovers a reviewing
evidence of shared information from the cloud server. At
that point the TPA confirms the accuracy of the evaluating
2. SYSTEM MODEL
confirmation. At long last, the TPA sends an auditing report
to the proprietor.
3. DESIGN OBJECTIVES
This mechanism is designed to achieve following properties
a.
Public Auditing
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12369
The outsider verifier has the capacity freely verify the
Every proprietor in the group creates his/her open key and
respectability of shared information for a group of proprietor
private key.
without recovering the whole information.
ii.
b.
Correctness
RingSign
A proprietor in the group has the capacity create a signature
on identifier is a string that can recognize the relating block
The outsider verifier has the capacity effectively identify
from others.
whether there is any erroneous block in shared information.
iii.
c.
Unforgeability
RingVerify.
A verifier has the capacity check whether a given piece is
signed by a group member.
Just a proprietor in the gathering can create substantial
confirmation data on shared information.
4.2 Auditing Mechanism
4.2.1 Overview
d.
Identity Privacy
Utilizing HARS and its properties, we now develop
During auditing, the TPA cannot distinguish the identity of
the designer on each block in shared data.
component, a privacy preserving public auditing
mechanism for shared data in the cloud. The verifier
can confirm the honesty of shared information
e.
Auditing on dynamic groups
without recovering the whole information. Then, the
Auditing process takes place with the help of outsider
identity of the endorser on every piece in shared
verifier, where he/she has no prior idea of group before
information is kept private from people in general
auditing. Insertion, deletion and modification operation are
verifier during auditing.
done on the blocks.
4. METHODOLOGY
4.1 Ring signature scheme
4.1.1
4.2.2
Construction
of
auditing
mechanism
Overview
Construction of auditing mechanism
The configuration of new homomorphic authenticable
consists of five algorithms
signature (HARS) scheme, which is extended from a classic
i.
KeyGen
ring signature scheme. The ring signatures generated by
HARS are not only able to preserve identity privacy but also
Proprietor create their own open/private key to register ring
able to support block less verifiability. We will demonstrate
signature on each block.
to fabricate the protection safeguarding open evaluating
ii.
component for shared information in the cloud in light of
this new ring signature scheme.
SigGen
A proprietor (either the original proprietor or a group
proprietor) is able to compute ring signatures on blocks in
shared data.
4.1.2
Construction of HARS
HARS consists of three algorithms
i.
iii.
Modify
KeyGen
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12370
Each proprietor in the group is able to perform an insert,
delete or update operation on a block, and compute the new
ring signature on this new block.
iv.
4.4 Construction of dynamic groups
We now examine the situation of dynamic groups under our
proposed system. In this process a new proprietor can be
ProofGen
included in the group or existing proprietor can be revoked
It is worked by the outside verifier (TPA) and the cloud
from the group, then this group is considered as dynamic
server together to produce a proof of ownership of shared
group. To support dynamic groups while yet permitting the
information.
outside verifier to perform open evaluating, all the ring
signatures on shared information should be re-registered
v.
ProofVerify
The outside verifier (TPA) checks the confirmation and
with the signers private key and other proprietors public key
when the enrolment of the group is changed.
sends an examining report to the proprietor.
4.4.1 System Architecture for Dynamic
group
4.3 Security analysis of auditing mechanism
We discuss security properties of auditing mechanism,
which includes its correctness, unforgeability, identity
privacy and data privacy.
Theorem: A public verifier is able to correctly audit the
integrity of shared data under public auditing mechanism.
Proof: According to the description of ProofVerify, a
public verifier believes the integrity of shared data is correct
if Equation holds. So, the correctness of our scheme can be
proved by verifying the correctness of Equation. Based on
properties of bilinear maps, the right-hand side (RHS) of
Equation can be expanded as follows
Fig.2. Proprietor, third party auditor and cloud
server, group admin in System
architecture for
dynamic groups.
The proposed system consists of four modules, where the
proprietor request owner of cloud for data to store the
information and use the resource of respective cloud.
Proprietor can then request the outside verifier to audit the
particular information. The outside verifier sends auditing
message to public cloud server and in return server sends
back the auditing proof. After examining the information,
the examined result is sent back to proprietor.
During the auditing process if there is any error in the
information, then the outside verifier requests the owner of
the private cloud for ssing or erroneous block of data.
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12371
4.4.2 Operations on dynamic groups
Fig.3a shows insertion operation, a block can be added to
existing block of information. The information will not be
There are three operations can be performed during
affected except the index value of the block.
verification of blocks of information, they are as follows
i.
Insert
ii.
Delete
iii.
Modify
Insert
Fig.3a. Change of index after inserting block
Fig.3b shows deletion operation, it is similar to insert operation. A block can be deleted from existing
block of information. The information will not be affected except the index value of the block.
Delete
Fig.3b. Change of index after deleting block
Modify operation includes both insert and delete operations
which is performed on the block of data, during the process
of auditing by the outside verifier.
The interesting issues we will keep on considering for our
5. CONCLUSION AND FUTURE WORK
proprietor) to uncover the identity of the signer in light of
In this paper, we purpose privacy preserving – public
confirmation metadata in some extraordinary circumstances.
future work. One of them is traceability, which implies the
capacity for the group supervisor (i.e., the original
auditing mechanism of shared information with dynamic
groups in cloud. The outside verifier is able to verify the
6. REFERENCES
blocks of information by utilizing the homomorphic ring
structure. The signature of proprietor is kept private, yet the
outside verifier can examine the blocks for checking the
uprightness of the information.
[1]
M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R.
H.Katz, A. Konwinski, G. Lee, D. A.
Patterson, A.
Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud
Computing,” Communications of the ACM, vol. 53, no. 4,
pp. 50–58, Apirl 2010.
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12372
[2]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” in Proc. ACM Conference
on Computer and Communications Security(CCS), 2007, pp.
598–610.
[3]
C. Wang, Q. Wang, K. Ren, and W. Lou,
“Privacy-Preserving Public Auditing for Data Storage
Security in Cloud Computing,” in Proc. IEEE International
Conference on Computer Communications (INFOCOM),
2010, pp. 525–533.
[4]
R. L. Rivest, A. Shamir, and Y. Tauman, “How to
Leak a Secret,” in Proc. International Conference on the
Theory and Application of Cryptology and Information
Security (ASIACRYPT). Springer- Verlag, 2001, pp. 552
565.
[5]
D. Boneh, C. Gentry, B. Lynn, and H. Shacham,
“Aggregate and Verifiably Encrypted Signatures from
Bilinear Maps,” in Proc. International Conference on the
Theory and Applications of Cryptographic Techniques
(EUROCRYPT). Springer-Verlag, 2003, pp. 416–432.
[6]
H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” in Proc. International Conference on the
Theory and Application of Cryptology and Information
Security (ASIACRYPT). Springer-Verlag, 2008, pp. 90–107.
[7]
Y. Zhu, H.Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.
S.Yau, “Dynamic Audit Services for Integrity Verification
of Outsourced Storage in Clouds,” in Proc. ACM
Symposium on Applied Computing (SAC), 2011, pp. 1550–
1557.
[8]
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving
Secure, Scalable, and Fine-grained Data Access Control in
Cloud Computing,” in Proc. IEEE International Conference
on Computer Communications (INFOCOM), 2010, pp. 534–
542.
[13]
A. Juels and B. S. Kaliski, “PORs: Proofs pf
Retrievability for Large Files,” in Proc. ACM Conference on
Computer and Communications Security (CCS), 2007, pp.
584–597.
[14]
G. Ateniese, R. D. Pietro, L. V. Mancini, and G.
Tsudik, “Scalable and Efficient Provable Data Possession,”
in Proc. International Conference on Security and Privacy
in Communication Networks (SecureComm), 2008.
[15]
C. Erway, A. Kupcu, C. Papamanthou, and R.
Tamassia, “Dynamic Provable Data Possession,” in Proc.
ACM Conference on Computer and Communications
Security (CCS), 2009, pp. 213–222.
[16]
C. Wang, Q. Wang, K. Ren, and W. Lou,
“Ensuring Data Storage Security in Cloud Computing,” in
Proc. IEEE/ACM International Workshop on Quality of
Service (IWQoS), 2009, pp. 1–9.
[17]
B. Chen, R. Curtmola, G. Ateniese, and RBurns,
“Remote Data Checking for Network Coding-based
Distributed Stroage Systems,”in Proc. ACM Cloud
Computing Security Workshop (CCSW),2010, pp. 31–42.
[18]
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou,
“LT Codes based Secure and Reliable Cloud Storage
Service,” in Proc. IEEE International Conference on
Computer Communications (INFOCOM),2012.
[19]
S. Halevi, D. Harnik, B. Pinkas, and A. ShulmanPeleg, “Proofs of Ownership in Remote Storage Systems,”
in Proc. ACM Conference on Computer and
Communications Security (CCS), 2011, pp. 491–500.
[20]
Q. Zheng and S. Xu, “Secure and Efficient Proof of
Storage with Deduplication,” in Proc. ACM Conference on
Data and Application Security and Privacy (CODASPY),
2012.
[9]
D. Boneh, B. Lynn, and H. Shacham, “Short
Signature from the Weil Pairing,” in Proc. International
Conference on the Theory and Application of Cryptology
and Information Security (ASIACRYPT). Springer-Verlag,
2001, pp. 514–532.
[10]
D. Boneh and D. M. Freeman, “Homomorphic
Signatures for Polynomial Functions,” in Proc.
International Conference on the Theory and Applications of
Cryptographic Techniques (EUROCRYPT). SpringerVerlag, 2011, pp. 149–168.
[11]
L. Ferrara, M. Green, S. Hohenberger, and M.
Pedersen,“Practical Short Signature Batch Verification,” in
Proc. RSA Conference, the Cryptographers’ Track (CTRSA). Springer-Verlag, 2009,pp. 309–324.
[12]
V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-Based Encryption for Fine Grained Access
Control of Encrypted Data,” in Proc. ACM Conference on
Computer and Communications Security (CCS), 2006, pp.
89–98.
Mrs. Suvarna L. kattimani1 IJECS Volume 4 Issue 6 June, 2015 Page No.12368-12373
Page 12373
Download
Related flashcards
Create Flashcards